Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
adio frequency identification (RFID) has been around for decades. Only recently, however, has the convergence of lower cost and increased capabilities made businesses take a hard look at what RFID can do for them.A major push came when retailing giant Wal-Mart dramatically announced that it would require its top 100 suppliers to supply RFID-enabled shipments by January 2005. Though the bottom line story of that deployment has yet to surface, it does seem to support the inevitable movement of inventory tracking and supply chain management toward RFID. This article offers an RFID tutorial that answers the following questions: What is RFID, and how does it work? What are some applications of RFID? What are some challenges and problems in RFID technology and implementation? How have some organizations implemented RFID?
TECHNICAL OVERVIEW
The basic premise behind RFID systems is that you mark items with tags. These tags contain transponders that emit messages readable by specialized RFID readers. Most RFID tags store some sort of identication number; for example a customer number or product SKU (stock-keeping unit) code. A reader retrieves information about the ID number from a database, and acts upon it accordingly. RFID tags can also contain writable memory, which can store information for transfer to various RFID readers in different locations. This information can track the movement of the tagged item, making that information available to each reader (A Guide to Understanding RFID, RFID J., retrieved 27 Feb. 2005; http:// www.rdjournal.com/article/gettingstarted/). RFID tags fall into two general categories, active and passive, depending on their source of electrical power. Active RFID tags contain their own power source, usually an on-board battery. Passive tags obtain power from the signal of an external reader. RFID readers also come in active and passive varieties, depending on the type of tag they read.
Inside
US Navy RFID Pilot Resources for RFID Products
Answering these questions will provide an organizational framework for RFID implementation from both the technical and business perspectives.
Active tags
Because they have their own power source, active tags transmit a stronger signal, and readers can access them from further away.The on-board
May June 2005 IT Pro 27
NEW
TECHNOLOGY
A passive-tag reader can constantly broadcast its signal or broadcast it on demand. When a tag comes within the readers range, it receives an electromagnetic signal from Passive RFID tag the reader through the tags 3. When the antenna. The tag then stores capacitor has the energy from the signal built up RFID enough energy, it in an on-board capacitor, a reader 1. RFID reader releases it over process called inductive coubroadcasts time to the pling.When the capacitor has electromagnetic tags coils. signal to tag. built up enough charge, it can power the RFID tags cir2. Antenna in the tag cuitry, which transmits a modreceives the signal ulated signal to the reader. from the reader and That return signal contains stores charge in a capacitor. the information stored in the tag. 4. The tags coils release an encoded radio The communication bewave containing the information in the tag, tween the reader and passive which the reader then demodulates. tag uses one of two methods to modulate the ID signal. Low-frequency (less than 100 MHz) tags pass information by releasing energy from the power source makes them larger and more expensive, so capacitor to the tag coils in varying strengths over time, active RFID systems typically work best on large items which affects the radio frequency emitted by the tag. The tracked over long distances. Low-power active tags are reader detects these varying waves and can use these variusually slightly larger than a deck of playing cards.Active ances to demodulate the code. Figure 1 shows this load tags can remain dormant until they come in range of a modulation. receiver or can constantly broadcast a signal. In higher-frequency (greater than 100 MHz) tags, the tag Because of their on-board power source, active tags opertransmits the signal using backscatter, in which the tags ate at higher frequenciescommonly 455 MHz, 2.45 GHz, circuit changes the resistance of the tags antenna. This or 5.8 GHzdepending on the applications read range change in resistance causes a transmission of RF waves, and memory requirements. Readers can communicate with which the reader can pick up and demodulate. Passive tags active RFID tags across 20 to 100 meters. typically operate at frequencies of 128 KHz, 13.6 MHz, 915 MHz, or 2.45 GHz, and have read ranges of a few inches Passive tags to 30 feet. Frequency choice depends on the systems enviPassive tags, on the other hand, are very inexpensive; ronment, what material the signal must travel through, and they can cost as little as 20 cents apiece, and new techthe systems required read range. nologies are constantly making them cheaper to integrate RFID tags can be encased in many materials. Plastics are into common materials and products. Because passive tags a very common material for RFID, forming identication are inexpensive, they will likely be the basis of most of the cards for building access, credit cards, or bus fares.Tags can growth in RFID implementations, so I will examine the also go on the back of labels printed on standard ink jet technology behind passive tags in detail. printers, for placement on inventory. In addition to their low cost, passive tags can also be quite small. Current antenna technology limits the smallest useful passive tag to about the size of a quarter. The STANDARDS larger the tag, the larger the read range. Several RFID standards exist, and their applications are Currently, passive RFID tags contain about 2 Kbits of under debate within the RFID development community. memory. This is too small to hold much more complex These standards cover information than identication and history information. The technology behind RFID is constantly improving, so identication, the coding of unique item identiers, or the amount of information and capabilities of RFID tags other data on the RF tag; will increase over time, allowing RFID tags to eventually data and system protocols, effectively the middleware contain and transmit much more information. of an RFID system;
Figure 1. Simplied view of data transfer in low-frequency passive RFID tags (the tag is enlarged for clarity).
28
the air interface, that is, the wireless communication between the reader and the tag; application support, which provides advice about how to implement the technology; testing, compliance, and health and safety, that is, the rules that govern RFID operations; and terminology.
The International Standards Organization (ISO) has three standards for RFID: ISO 14443 (for contactless systems), ISO 15693 (for vicinity systems, such as ID badges), and ISO 18000 (to specify the air interface for a variety of RFID applications). A not-for-profit organization, EPCglobal, has developed a widely accepted standard for product identification. The Electronic Product Code (EPC) standard covers the air interfaces, the format for the product identication data stored in an RFID tag, and the middleware and databases storing information about the tags. The US Department of Defense now requires suppliers to use RFID on lowest possible piece part/case/pallet packaging once the suppliers contract contains language regarding the requirement (http://www. dodrd.org).The DoD species EPCglobal or compatible tags. In 2004, the DoD ran a eld test RFID deployment, as the US Navy RFID Pilot sidebar describes. EPCglobal has developed a system called the Object Naming Service (ONS) that is similar to the Domain Name Service (DNS) used on the Internet. ONS acts as a directory service for organizations wishing to look up product numbers (also known as EPC numbers) on the Internet. EPCglobal awarded VeriSign a contract to manage ONS in January 2004. (VeriSign to Run EPC Directory, RFID J., 13 Jan. 2004; http://www.rdjournal.com/article/view/ 735/). In reports dated January, 2004, Wal-Mart, though a member company of EPCglobal, reported that it has no plans to use the ONS service, opting to use its own proprietary database and formats. In terms of the all important air interface, ISO 18000 and the EPC standard were incompatible. However, in January 2005, EPCglobal submitted its UHF Class 1 Generation 2 Specication for possible inclusion in the ISO standards. The National RFID Centre, an initiative of the UK Department of Trade and Industry, hailed the move as a much needed convergence of international RFID standards (Convergence of RFID Standardisation Efforts, 13 Jan. 2005, http://www.rfiduk. org/news/view. php?id=3).
computer.org/e-News
NEW
TECHNOLOGY
A reader collects detail information in one pass, without having to scan each product. Tags can store more data than bar codes. The last capability has several interesting applications in supply chain management. For example, read-write tags can store information about their environment. They can physically store their position and time throughout their movement in the supply chain. An example of a proposed use of RFID is to ensure safety in the supply chain. A US Food and Drug Administration (FDA) proposal supports using RFID to ensure the authenticity of prescription drugs. In this system, each drug shipment would carry a read-only RFID tag containing a unique serial number. Suppliers would track these serial numbers in shipment and have the drug purchaser verify the numbers on receipt, ensuring that the drugs came from where they were expected and arrived at their intended point of sale. The FDA realized that this is rather difcult to implement in such a large and supply chain as that for prescription drugs and proposed a three-year schedule for investigating the technology, ending in 2007, before it sets any policies (Combating Counterfeit Drugs, US Food and Drug Administration, Feb. 2004; http://www.fda.gov/oc/initiatives/counterfeit/report02_04.html#radiofrequency). A correlation to the supply chain management application is to enable automated just-in-time product shipments. If all products in a retail store and associated warehouses have RFID tags, a store should have an accurate database of its inventory. Systems in retail outlets could automatically alert a warehouse management system that inventories are low. The warehouse management system could locate the products in the warehouse based on their initial scan, and automatically move them to a loading dock for shipping to the retail outlet.Wal-Mart is implementing such a system.
Some car keys (upper left) contain a passive tag. An EzPass (upper right) helps collect highway tolls, a SmarTrip card (bottom) collects fares in a public transit system.
BUSINESS APPLICATIONS
RFID applications are numerous and far reaching. The most interesting and widely used applications include those for supply chain management, security, and the tracking of important objects and personnel.
Security
Security and personal identication applications are a major and broad application of RFID. A common use of RFID is in identication cards to control building access. Many organizations use RFID tags embedded in ID cards, which are readable at a building entrance. On a similar note, some credit cards (American Express ExpressPay, http://www.americanexpress.com/expresspay) and other payment devices, such as ExxonMobils Speedpass (http://www.speedpass.com), use RFID tags. Other cards use tags for automatic fare payment in mass-transit systems, such as the SmarTrip card for the Washington DC area subway and bus system (http://www.wmata.com/ riding/smartrip.cfm). Figure 2 shows samples of such cards. Essentially, these are a replacement for identication cards with magnetic stripes, providing a more reliable way to store identication informationmagnetic stripes tend to wear out and lose information over time. RFID tags also have a higher memory capacity than magnetic stripes.
Keys for new cars also incorporate passive RFID tags that work with a reader near the cars ignition switch.The reader will only accept codes stored in certain keys. If the code in a key does not match the reader in the car, the car will not start, making it more difcult to steal vehicles by copying keys.
Movement tracking
Because moving objects can easily carry RFID tags, a common use is to track the movement of people and the information associated with them. Some hospitals now use tags on newborns, to ensure identication and to alert hospital staff should someone attempt to take the baby outside of the hospital without authorization. Some schools are requiring children to wear tag-embedded bracelets or wrist bands while on school grounds, to monitor attendance Tutorials and to locate lost children (Tagging Toddlers A Guide to Understanding RFID, RFID J.; http://www. and Toothpaste, Information Management J., rdjournal.com/article/gettingstarted/. Sept.-Oct. 2004).The FDA recently approved a RFID 101, W. Singer, Logistics Today, Nov. 2004. RFID tag that could stay with surgical patients The Magic of RFID, R. Want, ACM Queue, Oct. 2004. in hospitals and store information on the surgical procedure the person requires, eliminating surprisingly common surgical mistakes (FDA Approves Surgical ID Tag, S. Lawrence, eWeek, Nov. 2004; ing habits automatically tracked electronically. Many prihttp://www.eweek.com/article2/0,1759,1731402,00.asp). vacy groups are concerned about the ability to identify This application of RFID has obvious privacy issues, as I people as they walk through a store or shopping center via will discuss later. the tags embedded in their clothing and linked to them at In the same way, tags can track the movement of highly the time of purchase. mobile objects in areas other than an organizations supTo counter such concerns, RFID proponents propose ply chain. For example, one large Las Vegas casino plans that retail tags have kill switches that disable the tag at to place passive tags in each gaming chip, and have readthe point of sale. Even though a small tag might remain ers at cashier stations and gaming tables. In this way, the embedded inside a product, once the kill switch is acticasino can detect counterfeit chips, and track the movevated, the tag would no longer transmit information ment of chips and player activity (Vegas Casino Bets (Some Methods for Privacy in RFID Communication, R. on RFID, A. Gilbert, 9 Feb. 2005, http://news.com. Fishkin and B. Jiang, Intel Research; http:// www.intelcom/Vegas+casino+bets+on+RFID/2100-7355_3-5568288. research.net/Publications/Seattle/ html?tag=nefd.top). 062420041517_243.pdf). Hospitals are also using RFID to track equipment Many of the privacy concerns regarding RFID are throughout a facility as it moves from room to room.This addressable because of the nature of RFID tags themhelps manage inventory and ensure the proper mainteselves. The read range of RFID tags is much too small to nance of equipment. Libraries also tag books, making it allow readers out of personal range to read tags carried on possible to easily locate a book in the stacks, prevent theft, a person or in a vehicle. Also, building materials tend to and automate the checkout process. absorb the relatively weak RF waves transmitted by passive tags, making it extremely difcult to pick up RFID signals through the walls of a home (RFID Privacy CHALLENGES AND ISSUES IN RFID Workshop: Concerns, Consensus, and Questions, S.Weiss, Although promising, RFID is not without its challenges, IEEE Security & Privacy, Mar.-Apr. 2004). which arise from both a technological and usage point of However, anytime someone automatically stores and view. tracks personal identication in electronic databases, privacy concerns are very real. RFID tags used in transPrivacy concerns portation systemswhether for fare collection on mass A common concern with RFID is privacy. It is discontransit systems or automatic toll payment on bridges and certing for many people to have their movements or buyMay June 2005 IT Pro 31
NEW
TECHNOLOGY
highwaysallows for the easy and unprecedented tracking of movement. If you can pay for products in an RFID tag and companies later bill you automatically, it takes all possible anonymity out of the retail process. Companies and government agencies must address these concerns before the public will truly feel comfortable using RFID systems. People will want to see policies about the use of an RFID system and the information it collects.
If the tag cannot authenticate the readers identity, the tag will refuse to transmit the information it stores. Like most security tactics, this scheme is vulnerable to attacks, such as man in the middle, or reverse engineering.
Security
Security is another key issue in RFID. An organization that implements RFID in its supply chain does not want competitors to track its shipments and inventory. People who use devices that carry personal nancial information, such as credit card or other ID numbers, do not want others to access their accounts. These are signicant security vulnerabilities in RFID. Some researchers have proposed schemes that would require tags to authenticate readers, transmitting information only to authorized readers.The tags would have to store ID numbers for authorized readers, and a reader would have to broadcast its ID to the tag. To protect the readers IDand prevent others from eavesdropping and stealing the informationthe reader uses either a xed or randomly generated number to hash (encrypt) its ID (Gao and colleagues).
REACH HIGHER
Advancing in the IEEE Computer Society can elevate your standing in the profession. Application to Senior-grade membership recognizes ten years or more of professional expertise Nomination to Fellow-grade membership recognizes exemplary accomplishments in computer engineering
www.computer.org/join/grades.htm
efcient supply chains in the world. With a large array of suppliers from many different industries,Wal-Marts RFID effort has the potential to cause a web of RFID implementations. One estimate puts Wal-Marts savings at $8.35 billion per year if it fully implemented RFID throughout its operations.That gure is more than the total revenue of half the companies on the Fortune 500 (Case Study:Wal-Marts Race for RFID, M. Roberti, eWeek, Sept. 2003; http://www.eweek.com/article2/0,1759,1492297, 00.asp). Though this savings is substantial, Wal-Mart has taken its RFID implementation fairly slowly. In 11 June 2003, Wal-Mart announced that it would require its top 100 suppliers to tag all cases and pallets by January 2005. This directive sent a wave of panic among suppliers, who scurried to learn about RFID and how best to implement the technology. Wal-Mart and its suppliers quickly found several challenges in its RFID implementation, namely that the UHF frequency they were using as a standard would not pass through many common products shipped to retail stores, such as water-based products and products shipped in metal packaging.This forced Wal-Mart to back off slightly and relax its deadline for full RFID implementation. By January 2005, the top 100 suppliers had only tagged about 60 percent of their products. Wal-Mart, though, was the first major retailer to implement RFID throughout the supply chain, and force its suppliers to implement RFID as well, so its natural to have some problems. Wal-Marts early adopter implementation forced the industry to learn about the challenges in RFID (Wal-Mart Gives Suppliers RFID Holiday Gift, E. Schuman, eWeek, Dec. 2004; http://www.eweek.com/article2/0,1759,1744834,00.asp). Wal-Mart provides information about its RFID efforts at http://www.walmartstores.com/wmstore/wmstores/ Mainsupplier.jsp?pagetype=supplier&categoryOID=10605 &catID=-8250&template=DisplayAllContents.jsp.
On the Web
Visit http://computer.org for information about joining and becoming involved with the Society and IT Pro.
FID, a technology existing for years, has potential uses in a variety of applications.Though not without issues and challenges, RFID is a promising technology which analysts expect to become ubiquitous in the coming years, helping organizations solve problems in supply chain management, security, personal identification, and asset tracking.
Reprint Permission
To obtain permission to reprint an article, contact William Hagen, IEEE Copyrights and Trademarks Manager, at w.hagen@ieee.org. To buy reprints, see http://www.computer.org/author/reprint.htm.
Ron Weinstein is a graduate student at Johns Hopkins University. He also works for Sybase as a consultant. Contact him at ron@ronsweinstein.com
For further information on this or any other computing topic, visit our Digital Library at http://www.computer. org/publications/dlib.
May June 2005 IT Pro 33